CVE-2026-2394
Buffer Over-read in RTI Connext Professional Core Libraries
Publication date: 2026-04-01
Last updated on: 2026-04-14
Assigner: RTI
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| rti | connext_professional | From 5.3.0 (inc) to 5.3.1.45 (inc) |
| rti | connext_professional | From 6.0.0 (inc) to 6.0.1.40 (inc) |
| rti | connext_professional | From 6.1.0 (inc) to 6.1.2.27 (inc) |
| rti | connext_professional | From 7.0.0 (inc) to 7.3.1.1 (exc) |
| rti | connext_professional | From 7.4.0 (inc) to 7.7.0 (exc) |
| rti | connext_professional | From 4.3.0 (inc) to 5.2.3 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-125 | The product reads data past the end, or before the beginning, of the intended buffer. |
| CWE-126 | The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-2394 is a critical security vulnerability in RTI Connext Professional involving a buffer over-read issue. Specifically, it is a heap buffer read overflow that occurs when the application parses an XML type. This means that during XML parsing, the software may read beyond the allocated memory buffer, potentially leading to unauthorized memory access or application instability.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided information does not specify how the CVE-2026-2394 vulnerability affects compliance with common standards and regulations such as GDPR or HIPAA.
How can this vulnerability impact me? :
This vulnerability can impact you by causing unauthorized memory access or application instability. Exploiting the buffer over-read could lead to crashes, denial of service, or potentially allow attackers to access sensitive information or execute arbitrary code within the affected RTI Connext applications.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves a heap buffer read overflow during XML parsing in RTI Connext applications. Detection would typically require monitoring for abnormal application behavior such as crashes or memory access violations related to XML processing.
No specific detection commands or network signatures are provided in the available information.
What immediate steps should I take to mitigate this vulnerability?
The provided information does not specify immediate mitigation steps such as patches, configuration changes, or workarounds.
Generally, mitigation for buffer over-read vulnerabilities includes updating affected RTI Connext Professional versions to fixed releases beyond the vulnerable versions listed.